Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe
Resource
win10v2004-20240419-en
General
-
Target
8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe
-
Size
5.7MB
-
MD5
54da90282e7b2fa9c1cf20fbbe3f0625
-
SHA1
732614d5489d69df97b74e5a53c136a85f91b857
-
SHA256
8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99
-
SHA512
e8ca340b6458622bd2928e112a3f2e70a2c470725f9d43914d4560cb10abb7d6cfac9b3b0f78842a43389c781f34043980aa72da14cc8e9dc52b8f93782141ff
-
SSDEEP
49152:0Pv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTPBm:yKUgTH2M2m9UMpu1QfLczqssnKSh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1756 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2172 Logo1_.exe 2688 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe -
Loads dropped DLL 1 IoCs
pid Process 1756 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\{2C18FE73-0135-4FFC-BCB7-4B0A9050B077}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\STS2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Groove.en-us\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe File created C:\Windows\Logo1_.exe 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2172 Logo1_.exe 2172 Logo1_.exe 2172 Logo1_.exe 2172 Logo1_.exe 2172 Logo1_.exe 2172 Logo1_.exe 2172 Logo1_.exe 2172 Logo1_.exe 2172 Logo1_.exe 2172 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1756 2076 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 28 PID 2076 wrote to memory of 1756 2076 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 28 PID 2076 wrote to memory of 1756 2076 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 28 PID 2076 wrote to memory of 1756 2076 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 28 PID 2076 wrote to memory of 2172 2076 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 29 PID 2076 wrote to memory of 2172 2076 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 29 PID 2076 wrote to memory of 2172 2076 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 29 PID 2076 wrote to memory of 2172 2076 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 29 PID 2172 wrote to memory of 2956 2172 Logo1_.exe 31 PID 2172 wrote to memory of 2956 2172 Logo1_.exe 31 PID 2172 wrote to memory of 2956 2172 Logo1_.exe 31 PID 2172 wrote to memory of 2956 2172 Logo1_.exe 31 PID 2956 wrote to memory of 2680 2956 net.exe 33 PID 2956 wrote to memory of 2680 2956 net.exe 33 PID 2956 wrote to memory of 2680 2956 net.exe 33 PID 2956 wrote to memory of 2680 2956 net.exe 33 PID 2172 wrote to memory of 1228 2172 Logo1_.exe 21 PID 2172 wrote to memory of 1228 2172 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe"C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a23B6.bat3⤵
- Deletes itself
- Loads dropped DLL
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe"C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe"4⤵
- Executes dropped EXE
PID:2688
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2680
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD58d1917f237658b1fc24316320e062aea
SHA134d8e8255e61312faacf4ccc8eb3bc5805bc447a
SHA256949bd266dca986ead5011302e73fc29c14e1aad133d1faed2e8838df2755e123
SHA512a4f6ffc607081626c8ab97f4651c9e0db5ae7ac8d21b662060625acd77118745850946ed78d1508a030f54193ec906b545477c570e086c6cebd56cd65413a54f
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD52ecdd710428f475504c095c0425b150a
SHA1900d7d006c6607ffb66b493ca51cba56ca1d20a1
SHA256bb8b68e18d9d54d5d298fcbbdc4cccee932f6faec2f5f615f6f6cc100776d0f8
SHA51252d69d54525129d8fc1ea1b2c781d179aad24c5dc746fb1662ea9c670a42556e9665d84e0329a91071bdb597aee27e8077e30987a34ca5f881886b135049bee0
-
C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe.exe
Filesize5.7MB
MD5c596c3539f619ec76f36741933da5bed
SHA1b3243f0ee893528f0ccd71700ca9970def6670b5
SHA256bb9f95d1b280c1ec9ae27cf564bbb1b485e2d721d44b3288a9a43c07517e38de
SHA512e6e9bd571f8a74b0d2f1a88f9c90fbf10a2150cda55cd4ad6f9a37e0c4a957a175ecb8adf17822331e6cb83bac6fec5bdc2fc87fdb5bc2bfa46ad7dac4df31d2
-
Filesize
27KB
MD5151e98c05a995884a3f5fe2077409a99
SHA1e7379083dd24f1dc62d41698f86a805db837e929
SHA256e3cdf680322b8ce4451e5bac81f4403fabef6cc7c33d7ca23eb55564656e2413
SHA512108ce79cd432c17c4bba84878e95f1d0c38ab8546356d4e2f75eba182a145449969b602b183158f56b8ff08a7c4cbc0811fb21e07268fe9a47eaeb442737105b
-
Filesize
8B
MD5ec89b9cba2f5e7b9394fdd901d6c3977
SHA163b0db3abcd08b863a9a3944799b41efa264db40
SHA2562b4efa4e113d3044c8e47f59a7b75225cc7736c2fa28f9e52949b9441f3d77ca
SHA512901f7d44754e59fba0b1b90341927744f670463f4d18e2694617f74fe4e3f456e9088530bccc16e758fc67a23f91380a3655121ba911e8ff5173f3ac4cb0f1d2